Vulnerability Description
In the Lustre file system before 2.12.3, the ptlrpc module has an osd_map_remote_to_local out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. osd_bufs_get in the osd_ldiskfs module does not validate a certain length value.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lustre | Lustre | < 2.12.3 |
Related Weaknesses (CWE)
References
- http://lustre.org/ProductVendor Advisory
- http://wiki.lustre.org/Lustre_2.12.3_ChangelogRelease NotesVendor Advisory
- https://jira.whamcloud.com/browse/LU-12612ExploitThird Party Advisory
- https://review.whamcloud.com/#/c/36273/Third Party Advisory
- http://lustre.org/ProductVendor Advisory
- http://wiki.lustre.org/Lustre_2.12.3_ChangelogRelease NotesVendor Advisory
- https://jira.whamcloud.com/browse/LU-12612ExploitThird Party Advisory
- https://review.whamcloud.com/#/c/36273/Third Party Advisory
FAQ
What is CVE-2019-20431?
CVE-2019-20431 is a vulnerability with a CVSS score of 7.5 (HIGH). In the Lustre file system before 2.12.3, the ptlrpc module has an osd_map_remote_to_local out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. ...
How severe is CVE-2019-20431?
CVE-2019-20431 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-20431?
Check the references section above for vendor advisories and patch information. Affected products include: Lustre Lustre.